IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v13y2021i8p198-d605825.html
   My bibliography  Save this article

A Survey on Botnets: Incentives, Evolution, Detection and Current Trends

Author

Listed:
  • Simon Nam Thanh Vu

    (DTU Compute, Technical University of Denmark, 2800 Kgs. Lyngby, Denmark
    These authors contributed equally to this work.)

  • Mads Stege

    (DTU Compute, Technical University of Denmark, 2800 Kgs. Lyngby, Denmark
    These authors contributed equally to this work.)

  • Peter Issam El-Habr

    (DTU Compute, Technical University of Denmark, 2800 Kgs. Lyngby, Denmark
    These authors contributed equally to this work.)

  • Jesper Bang

    (DTU Compute, Technical University of Denmark, 2800 Kgs. Lyngby, Denmark
    These authors contributed equally to this work.)

  • Nicola Dragoni

    (DTU Compute, Technical University of Denmark, 2800 Kgs. Lyngby, Denmark
    Current address: Richard Petersens Plads, 2800 Kgs. Lyngby, Denmark.)

Abstract

Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-service attacks, information theft, spam and malware propagation. In this paper, a systematic literature review on botnets is presented to the reader in order to obtain an understanding of the incentives, evolution, detection, mitigation and current trends within the field of botnet research in pervasive computing. The literature review focuses particularly on the topic of botnet detection and the proposed solutions to mitigate the threat of botnets in system security. Botnet detection and mitigation mechanisms are categorised and briefly described to allow for an easy overview of the many proposed solutions. The paper also summarises the findings to identify current challenges and trends within research to help identify improvements for further botnet mitigation research.

Suggested Citation

  • Simon Nam Thanh Vu & Mads Stege & Peter Issam El-Habr & Jesper Bang & Nicola Dragoni, 2021. "A Survey on Botnets: Incentives, Evolution, Detection and Current Trends," Future Internet, MDPI, vol. 13(8), pages 1-43, July.
  • Handle: RePEc:gam:jftint:v:13:y:2021:i:8:p:198-:d:605825
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/13/8/198/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/13/8/198/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Xuan Dau Hoang & Quynh Chi Nguyen, 2018. "Botnet Detection Based On Machine Learning Techniques Using DNS Query Data," Future Internet, MDPI, vol. 10(5), pages 1-11, May.
    2. Ruidong Chen & Weina Niu & Xiaosong Zhang & Zhongliu Zhuo & Fengmao Lv, 2017. "An Effective Conversation-Based Botnet Detection Method," Mathematical Problems in Engineering, Hindawi, vol. 2017, pages 1-9, April.
    3. Georgios Spathoulas & Nikolaos Giachoudis & Georgios-Paraskevas Damiris & Georgios Theodoridis, 2019. "Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets," Future Internet, MDPI, vol. 11(11), pages 1-24, October.
    4. Ahmad Karim & Rosli Salleh & Muhammad Khurram Khan, 2016. "SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications," PLOS ONE, Public Library of Science, vol. 11(3), pages 1-35, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Sangita Baruah & Dhruba Jyoti Borah & Vaskar Deka, 2023. "Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 17(1), pages 1-16, January.
    2. Lihua Yin & Weizhe Chen & Xi Luo & Hongyu Yang, 2024. "Efficient Large-Scale IoT Botnet Detection through GraphSAINT-Based Subgraph Sampling and Graph Isomorphism Network," Mathematics, MDPI, vol. 12(9), pages 1-20, April.
    3. Kainat Ansar & Mansoor Ahmed & Markus Helfert & Jungsuk Kim, 2023. "Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions," Mathematics, MDPI, vol. 12(1), pages 1-21, December.
    4. Zeeshan Hussain & Adnan Akhunzada & Javed Iqbal & Iram Bibi & Abdullah Gani, 2021. "Secure IIoT-Enabled Industry 4.0," Sustainability, MDPI, vol. 13(22), pages 1-14, November.
    5. Shatha Alharbi & Afraa Attiah & Daniyal Alghazzawi, 2022. "Integrating Blockchain with Artificial Intelligence to Secure IoT Networks: Future Trends," Sustainability, MDPI, vol. 14(23), pages 1-27, November.
    6. R. Akilandeswari & S. Malathi, 2022. "Design and implementation of controlling with preventing DDOS attacks using bitcoin by Ethereum block chain technology," Journal of Transportation Security, Springer, vol. 15(3), pages 281-297, December.

    More about this item

    Keywords

    botnet; malware; security; IoT;
    All these keywords.

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:13:y:2021:i:8:p:198-:d:605825. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.